There’s An App For That (Pentesting Mobile Apps) by Joe McCray

This is a 2-day workshop focused on hands-on mobile application security
testing. Each day this course starts you off with setting up your
environment (emulator/sdk/hardware/etc), then quickly moves into using your
device as an attack platform. From there the course goes into the basics of
reverse engineering mobile applications, exploiting mobile applications on
each respective platform, and finally on to attacking web services from each
platform.

Important Note:
Students are strongly encouraged to bring a Mac laptop running OS 10.6 Snow
Leopard, and XCode 3.2.6

Running Windows or Linux is acceptable for the first day of class (Android),
but for the second day of class (iDevices) it is strongly recommended that
each student have Mac laptop running OS 10.6 Snow Leopard, and XCode 3.2.6

A crash course in pentesting and securing VOIP networks by Sandro Gauci and Joffrey Czarny (Sn0rkY)

As VoIP networks become more and more part of the way organizations
communicate, security professionals need to understand their strengths
and weaknesses. This knowledge will help them make sound decisions on
the security (or lack of) of their VoIP system and network.

Attendees who follow the VoIP security training will gain valuable
hands-on experience in testing VoIP equipment and networks. During the
training they will make use of existent security tools as well as
custom built tools to help them get the job done.

Toll fraud or making phone calls for free (at the expense of the victim)

Attacks on PBX systems, including those specific to web applications

Wiretapping of phone calls, both on physical network and remote wiretapping

Denial of service attacks affecting both phones and PBX systems

Attacks specific to Cisco and Asterisk VoIP solutions

Common IP Phone vulnerabilities

Dissecting Wireless Network Security by Vivek Ramachandran

This workshop will provide a highly technical and in-depth treatment of Wi-Fi security. The emphasis will be to provide the participants with a deep understanding of the principles behind various attacks and not just a quick how-
to guide on publicly available tools.

We will start our journey with the very basics by dissecting WLAN packet headers with Wireshark, then graduate to the next level by cracking WEP, WPA/WPA2 and then move on to real life challenges like orchestrating Man-in-the-
Middle attacks and taking on the live Wi-Fi CTF!